eBPF-based Security Observability and Runtime Enforcement
Linux Runtime Security and Forensics using eBPF
Runtime Security Enforcement System
Malicious activity detection for Cloud-native applications
World's fastest and most advanced password recovery utility
Vulnerability Static Analysis for Containers
Node.js wrapper for FingerprintJS Server API
A simple SSL/TLS proxy with mutual authentication
Elixir Authentication
Example PAM module demonstrating two-factor authentication
Secure software enclave for storage of sensitive information in memory
Use AWS Identity and (IAM) to connect to Amazon Managed Streaming
Sign PDF with Digital Signature Certificate
C++ cryptographic library (modern hash functions, ciphers, KDFs)
Scriptable network authentication cracker (formerly `badtouch`)
Angular Material UI component for firebase authentication
Encryption/Decryption demonstration app using the S-DES algorithm
Simplified Architecture for Distributed Systems
Open Source Security tool to audit hashed passwords.
A File Transfer Server built with RBAC and custom business rules
Generates using (OUI) Verified MAC Addresses
Encryption addressing long-term data secrecy
Distributed reverse / forward proxy and tunneling solution for TCP.